generated from terraform-ibm-modules/terraform-ibm-module-template
-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix: onboard module to IBM Cloud module registry (#491)
- Loading branch information
1 parent
58562ae
commit 9ba1783
Showing
21 changed files
with
130 additions
and
34 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
# Basic example | ||
|
||
A simple example that shows how to create a standard and a root key in an existing IBM Key Management Service (KMS) instance. | ||
|
||
The following resources are provisioned by this example: | ||
- Create a root key in the existing KMS instance. | ||
- Create a standard key in the existing KMS instance. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
{ | ||
"ibmcloud_api_key": $VALIDATION_APIKEY, | ||
"existing_kms_instance_guid": $HPCS_US_SOUTH_GUID, | ||
"prefix": $PREFIX | ||
} |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
# Complete example | ||
|
||
A complete example showing how to provision a Key Protect instance, a root key and a standard key. | ||
|
||
The following resources are provisioned by this example: | ||
- A new resource group, if an existing one is not passed in. | ||
- An IBM Key Protect instance. | ||
- A Root Key in the KMS instance. | ||
- A Standard Key in the KMS instance. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
{ | ||
"ibmcloud_api_key": $VALIDATION_APIKEY, | ||
"region": "us-south", | ||
"resource_tags": $TAGS, | ||
"prefix": $PREFIX | ||
} |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file was deleted.
Oops, something went wrong.
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,73 @@ | ||
{ | ||
"products": [ | ||
{ | ||
"name": "terraform-ibm-kms-key", | ||
"label": "KMS Key module", | ||
"product_kind": "module", | ||
"tags": [ | ||
"dev_ops", | ||
"target_terraform", | ||
"terraform", | ||
"module" | ||
], | ||
"keywords": [ | ||
"terraform", | ||
"key protect", | ||
"hpcs", | ||
"keys", | ||
"encryption", | ||
"kms" | ||
], | ||
"short_description": "Terraform module to create a standard or root key in an IBM Key Management Service (KMS).", | ||
"long_description": "Use this module to create a standard or root key in an existing key ring and IBM Key Management Services (KMS) instance. The KMS can be IBM Key Protect or IBM Cloud Hyper Protect Crypto Services(HPCS) instance. You can specify rotation and deletion policies for the keys.\n\n### Usage\n```hcl\nprovider \"ibm\" {\n ibmcloud_api_key = \"XXXXXXXXXX\"\n # Must be the same region the KMS instance is in\n region = \"us-south\"\n}\n\n# KMS root key\nmodule \"kms_root_key\" {\n # Replace \"X.X.X\" with a release version to lock into a specific release\n source. = \"https://cm.globalcatalog.cloud.ibm.com/api/v1-beta/offering/source?archive=tgz&kind=terraform&name=terraform-ibm-kms-key&version=X.X.X\"\n kms_instance_id = \"XXxxXXxx-xxxx-XXXX-xxxx-XXxxXXxx\"\n key_name = \"my-root-key\"\n}\n\n# KMS standard key\nmodule \"kms_standard_key\" {\n # Replace \"X.X.X\" with a release version to lock into a specific release\n source. = \"https://cm.globalcatalog.cloud.ibm.com/api/v1-beta/offering/source?archive=tgz&kind=terraform&name=terraform-ibm-kms-key&version=X.X.X\"\n kms_instance_id = \"XXxxXXxx-xxxx-XXXX-xxxx-XXxxXXxx\"\n key_name = \"my-standard-key\"\n standard_key = true\n}\n```", | ||
"offering_docs_url": "https://github.com/terraform-ibm-modules/terraform-ibm-kms-key/blob/main/README.md", | ||
"offering_icon_url": "https://raw.githubusercontent.com/terraform-ibm-modules/documentation/main/icons/key_protect_icon.svg", | ||
"features": [ | ||
{ | ||
"title": "Create a KMS key", | ||
"description": "Create a standard or root key in an existing IBM KMS instance key ring." | ||
}, | ||
{ | ||
"title": "Create a KMS key policy", | ||
"description": "Create a key policy for a standard or root key in an IBM KMS instance." | ||
} | ||
], | ||
"flavors": [ | ||
{ | ||
"label": "Basic", | ||
"name": "basic", | ||
"working_directory": "examples/basic", | ||
"architecture": { | ||
"diagrams": [ | ||
{ | ||
"diagram": { | ||
"caption": "Basic example", | ||
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/documentation/main/icons/ModuleExampleDiagram.svg", | ||
"type": "image/svg+xml" | ||
}, | ||
"description": "A simple example that shows how to create a standard and a root key in an existing IBM Key Management Service (KMS) instance." | ||
} | ||
] | ||
} | ||
}, | ||
{ | ||
"label": "Complete", | ||
"name": "complete", | ||
"working_directory": "examples/complete", | ||
"architecture": { | ||
"diagrams": [ | ||
{ | ||
"diagram": { | ||
"caption": "Complete example", | ||
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/documentation/main/icons/ModuleExampleDiagram.svg", | ||
"type": "image/svg+xml" | ||
}, | ||
"description": "A complete example that shows how to provision a Key Protect instance, a root key and a standard key." | ||
} | ||
] | ||
} | ||
} | ||
] | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters